Sponsored by: Netwrix
HIPAA’s “Wall of Shame” lists all breaches that affected at least 500 individuals. In the past two years alone, 394 breaches made the list, almost a half of which was the result of unauthorized access or disclosure. How can you set risk-appropriate access controls and keep your organization off the “wall of shame”?
HIPAA consultant David Ginsberg shares a real-world use case and expert advice, including:
- How to determine who has access to sensitive data
- How to detect any PHI that surfaces outside of a secure location
- How to demonstrate to auditors that you protect data as required by HIPAA
Please enter your email address to access this resource